HOW TO TRANSMIT MESSAGES VIA WSN IN A HOSTILE ENVIRONMENT

Marek Klonowski, Michał Koza, Mirisosław Kutyłowski

2011

Abstract

In this paper we present a scheme for secure message transmission in WSN in the presence of an adversary. We assume that the adversary can easily find \emph{some random} nodes. However it is much harder for it to find all of them (or even a concrete subset) quickly. Security of the proposed scheme is based on this practical assumption. The protocol can be easily combined with various routing schemes as a security layer preserving all merits of the underlying protocol for the price of reasonable communicational and storage overhead.

References

  1. Chan, H. and Perrig, A. (2005). Pike: Peer intermediaries for key establishment in sensor networks. In The 24th Conference of the IEEE Communications Society (Infocom 2005).
  2. Chan, H. and Perrig, A. (2005). Pike: Peer intermediaries for key establishment in sensor networks. In The 24th Conference of the IEEE Communications Society (Infocom 2005).
  3. CichoÁ, J., Grzaslewicz, J., and Kutylowski, M. (2009). Key levels and securing key predistribution against node captures. In Dolev, S., editor, ALGOSENSORS, volume 5804 of Lecture Notes in Computer Science, pages 64-75. Springer.
  4. CichoÁ, J., Grzaslewicz, J., and Kutylowski, M. (2009). Key levels and securing key predistribution against node captures. In Dolev, S., editor, ALGOSENSORS, volume 5804 of Lecture Notes in Computer Science, pages 64-75. Springer.
  5. Du, W., Deng, J., Han, Y. S., Varshney, P. K., Katz, J., and Khalili, A. (2005). A pairwise key predistribution scheme for wireless sensor networks. ACM Trans. Inf. Syst. Secur., 8(2):228-258.
  6. Du, W., Deng, J., Han, Y. S., Varshney, P. K., Katz, J., and Khalili, A. (2005). A pairwise key predistribution scheme for wireless sensor networks. ACM Trans. Inf. Syst. Secur., 8(2):228-258.
  7. Eschenauer, L. and Gligor, V. D. (2002). A keymanagement scheme for distributed sensor networks. In CCS 7802: Proceedings of the 9th ACM conference on Computer and communications security, pages 41- 47, New York, NY, USA. ACM Press.
  8. Eschenauer, L. and Gligor, V. D. (2002). A keymanagement scheme for distributed sensor networks. In CCS 7802: Proceedings of the 9th ACM conference on Computer and communications security, pages 41- 47, New York, NY, USA. ACM Press.
  9. Iwanik, J., Klonowski, M., and Kutylowski, M. (2004). Duo-onions and hydra-onions - failure and adversary resistant onion protocols. In Proceedings of the IFIP TC-6 TC-11 Conference on Communications and Multimedia Security 2004. Springer Boston, Springer Boston.
  10. Iwanik, J., Klonowski, M., and Kutylowski, M. (2004). Duo-onions and hydra-onions - failure and adversary resistant onion protocols. In Proceedings of the IFIP TC-6 TC-11 Conference on Communications and Multimedia Security 2004. Springer Boston, Springer Boston.
  11. Klonowski, M., Kutylowski, M., Ren, M., and Rybarczyk, K. (2007). Forward-secure key evolution in wireless sensor networks. In Bao, F., Ling, S., Okamoto, T., Wang, H., and Xing, C., editors, CANS, volume 4856 of Lecture Notes in Computer Science, pages 102- 120. Springer.
  12. Klonowski, M., Kutylowski, M., Ren, M., and Rybarczyk, K. (2007). Forward-secure key evolution in wireless sensor networks. In Bao, F., Ling, S., Okamoto, T., Wang, H., and Xing, C., editors, CANS, volume 4856 of Lecture Notes in Computer Science, pages 102- 120. Springer.
  13. Ren, M., Das, T. K., and Zhou, J. (2006). Diverging keys in wireless sensor networks. In Katsikas, S. K., Lopez, J., Backes, M., Gritzalis, S., and Preneel, B., editors, ISC, volume 4176 of Lecture Notes in Computer Science, pages 257-269. Springer.
  14. Ren, M., Das, T. K., and Zhou, J. (2006). Diverging keys in wireless sensor networks. In Katsikas, S. K., Lopez, J., Backes, M., Gritzalis, S., and Preneel, B., editors, ISC, volume 4176 of Lecture Notes in Computer Science, pages 257-269. Springer.
  15. Rivest, R. (1998). Chaffing and winnowing: Confidentiality without encryption.
  16. Rivest, R. (1998). Chaffing and winnowing: Confidentiality without encryption.
  17. Shamir, A. (1979). How to share a secret. Commun. ACM, 22(11):612-613.
  18. Shamir, A. (1979). How to share a secret. Commun. ACM, 22(11):612-613.
Download


Paper Citation


in Harvard Style

Klonowski M., Koza M. and Kutyłowski M. (2011). HOW TO TRANSMIT MESSAGES VIA WSN IN A HOSTILE ENVIRONMENT . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011) ISBN 978-989-8425-71-3, pages 387-390. DOI: 10.5220/0003523403870390


in Harvard Style

Klonowski M., Koza M. and Kutyłowski M. (2011). HOW TO TRANSMIT MESSAGES VIA WSN IN A HOSTILE ENVIRONMENT . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011) ISBN 978-989-8425-71-3, pages 387-390. DOI: 10.5220/0003523403870390


in Bibtex Style

@conference{secrypt11,
author={Marek Klonowski and Michał Koza and Mirisosław Kutyłowski},
title={HOW TO TRANSMIT MESSAGES VIA WSN IN A HOSTILE ENVIRONMENT},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)},
year={2011},
pages={387-390},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003523403870390},
isbn={978-989-8425-71-3},
}


in Bibtex Style

@conference{secrypt11,
author={Marek Klonowski and Michał Koza and Mirisosław Kutyłowski},
title={HOW TO TRANSMIT MESSAGES VIA WSN IN A HOSTILE ENVIRONMENT},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)},
year={2011},
pages={387-390},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003523403870390},
isbn={978-989-8425-71-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)
TI - HOW TO TRANSMIT MESSAGES VIA WSN IN A HOSTILE ENVIRONMENT
SN - 978-989-8425-71-3
AU - Klonowski M.
AU - Koza M.
AU - Kutyłowski M.
PY - 2011
SP - 387
EP - 390
DO - 10.5220/0003523403870390


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)
TI - HOW TO TRANSMIT MESSAGES VIA WSN IN A HOSTILE ENVIRONMENT
SN - 978-989-8425-71-3
AU - Klonowski M.
AU - Koza M.
AU - Kutyłowski M.
PY - 2011
SP - 387
EP - 390
DO - 10.5220/0003523403870390